Assembly Language Adventures exercises for Yasm on Linux
☆98Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for asm_prog_ex_yasm
Users that are interested in asm_prog_ex_yasm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- x86 Assembly Adventures code snippets☆121Jul 13, 2018Updated 7 years ago
- Exercises for Assembly language course☆350Dec 24, 2022Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Nov 5, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- I/O Multiplexing for Linux and OSX (BSD)☆14May 14, 2014Updated 11 years ago
- An operating system.☆30Dec 6, 2017Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Tokamak Terminal☆11Dec 17, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆21Jun 23, 2014Updated 11 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- A Java program to generate beautiful ASCII art of letters and numbers.☆12Jul 22, 2015Updated 10 years ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- ☆13Apr 30, 2016Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Problems can be found over - https://www.hackerrank.com/domains/shell/bash/☆13Jan 20, 2015Updated 11 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Blind RSA signatures implementation for Zig.☆19Jan 31, 2026Updated last month
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- A DID method implementation that extends the Sidetree protocol into a Fediverse of interconnected nodes and witnessed using certificate t…☆35Oct 30, 2025Updated 4 months ago
- The Ultimate Guide to Pwning☆60Apr 4, 2018Updated 7 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A kernel with a purpose - to keep most of the code out of the kernel☆15Jun 30, 2019Updated 6 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆14May 16, 2024Updated last year
- Color scheme inspired by the art of Rubens LP☆13Jul 14, 2015Updated 10 years ago
- Burp-suite Extension For finding .map files☆54Dec 19, 2023Updated 2 years ago
- Teste front-end trampos.co☆14Mar 17, 2014Updated 12 years ago
- 010 Editor Keygen☆16May 14, 2018Updated 7 years ago